WO2013013553A1 - 清理文件系统的方法和装置及存储介质 - Google Patents
清理文件系统的方法和装置及存储介质 Download PDFInfo
- Publication number
- WO2013013553A1 WO2013013553A1 PCT/CN2012/077694 CN2012077694W WO2013013553A1 WO 2013013553 A1 WO2013013553 A1 WO 2013013553A1 CN 2012077694 W CN2012077694 W CN 2012077694W WO 2013013553 A1 WO2013013553 A1 WO 2013013553A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- specified volume
- file
- volume
- disk
- cleaning
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/1727—Details of free space management performed by the file system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
- G06F16/162—Delete operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0623—Securing storage systems in relation to content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0674—Disk device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Definitions
- the present invention relates to the field of file systems, and in particular, to a method and apparatus for cleaning a file system and a storage medium. Background of the invention
- user privacy information is generated in the process of using a web browser and various softwares, and user privacy information is also generated when using the file system of windows itself.
- a large number of personal files are stored in the user's computer disk, and these files contain a large amount of user privacy information. If for some reason you need to transfer your used computer to someone else (such as the adjustment of the internal staff position, etc.), the usual practice is to delete or format the files stored in the computer, but these operations The file will not be completely cleaned up. The file data and the data related to the file will be hidden on the disk, and a large amount of user privacy information remains. If the data recovery software is used, all the file data or part of the file may be deleted.
- Embodiments of the present invention provide a method and apparatus for cleaning a file system and a storage medium to improve security of a file system.
- the technical solution is as follows:
- the present invention discloses a method for cleaning a file system, comprising: opening and locking a specified volume according to a received cleanup instruction; The specified volume to be cleaned up;
- the disk corresponding to the specified volume is discarded and the specified volume is unlocked after the cleaning is completed.
- the invention also discloses a storage medium in which is stored a data processing program for performing the method of the present invention.
- the present invention also discloses an apparatus for cleaning a file system, comprising: a locking module, configured to open and lock a specified volume according to the received cleaning instruction; and the cleaning instruction is used to indicate a specified volume to be cleaned;
- the cleaning module is configured to: clean the disk obsolete information corresponding to the specified volume; and the unlocking module is configured to unlock the specified volume after the cleaning module is cleaned.
- the present invention cleans up the disc-discarded information corresponding to the specified volume when receiving the clean-up command. Since the disc-discarded information may involve related data of the deleted file or the formatted volume, If the disk discard information corresponding to the specified volume is cleared, the file data containing the user's privacy remaining in the file system will be cleaned up more thoroughly, avoiding the leakage of user privacy and improving the security of the file system. BRIEF DESCRIPTION OF THE DRAWINGS
- FIG. 1 is a structural diagram of a NTFS file system in the prior art
- FIG. 2 is a structural diagram of a FAT file system in the prior art
- FIG. 3 is a flowchart of a method for cleaning a file system according to an embodiment of the present invention
- FIG. 4 is a flowchart of a method for cleaning a file system according to an embodiment of the present invention
- FIG. 6 is a schematic structural diagram of an apparatus for cleaning a file system according to an embodiment of the present invention
- FIG. 7 is a schematic structural diagram of an apparatus for cleaning a file system according to an embodiment of the present invention.
- Figure 9a is a schematic diagram of a composition of the second cleaning module
- Figure 9b is a schematic diagram of still another composition of the second cleaning module.
- FIG. 10 is a schematic diagram showing the structure of an apparatus for cleaning a file system according to an embodiment of the present invention.
- the embodiments of the present invention will be described clearly and completely in conjunction with the drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of them. An embodiment. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
- FIG. 1 is a structural diagram of a file system of a new technology file system (NTFS, New Technology File System) in the prior art.
- the DOS boot record (DBR, Dos Boot Record) is an NTFS volume boot sector, and includes boot information of the NTFS volume.
- the data ( DATA ) is a data area containing data of various files and folders.
- the Master File Table (MFT) is NTFS metadata that holds important information such as NTFS volume information, files, and folder attributes. Each file under NTFS has one or more MFT counterparts. When the file data is small, NTFS saves the file data in the MFT.
- Windows deletes a file under NTFS the main operations are as follows:
- the user data that Windows does not clear mainly consists of two parts, one part is the information occupied by the deleted file, for example, including: file name, file time, file size, etc. data stored in the MFT.
- the data contains the privacy of the user, which is easy to cause privacy leakage.
- the other part is the file data, the data of the DATA area, and the file data kept in the MFT. This part of the data will still exist on the disk when there is no new data coverage. , resulting in user privacy leakage.
- FIG. 2 is a structural diagram of a file system of a file allocation table (FAT) in the prior art. See Figure 2, where DBR is the FAT volume boot sector and contains the boot information for the FAT volume. Reserved Sectors is a FAT reserved sector; FAT(s) is a FAT table, which includes a directory entry, each file corresponds to a directory entry, and the directory entry includes attribute information such as file name, file time, file size, etc. Data can also be called: information occupied by deleted files; RootDirectory is the root directory, only exists in FAT12/FAT16; DATA is the data area.
- the main operations are as follows:
- the number of users that Windows did not clear in the FAT file system It mainly contains information and file data occupied by deleted files.
- the information occupied by the deleted file includes, for example, a file name, a file time, a file size, and the like, which are stored in the FAT directory entry. Since the file has been deleted, the above un-cleared user data still exists on the disk, but will not be used anymore. Therefore, the user data that is not cleared by the above windows may also be referred to as disk discarded information.
- the present invention provides a method for cleaning a file system.
- the method mainly includes:
- the volume refers to a storage area on the hard disk.
- the drive formats the volume using a file system such as FAT or NTFS and assigns it a drive letter.
- a hard disk consists of many volumes, and a volume can span many disks.
- the cleaning operation of the present invention is directed to a volume of a computer that can be specified by the user when performing a clearing operation.
- a selection option is popped up to the user, requiring the user to select at least one volume as the clearing object.
- the specific information includes: clearing the corresponding disk of the specified volume The information occupied by the file has been deleted, and the free space of the volume in the corresponding disk of the specified volume is cleared.
- the cleanup instruction is issued after the user performs a formatting operation on the specified volume, since the file system erases the metadata of the existing file system after formatting the disk, only You need to clear the free space of the volume in the file system. Therefore, when the disk corresponding to the specified volume is discarded, the specific information includes:
- the information occupied by the deleted file in the corresponding disk of the specified volume is cleared, and the free space of the volume in the corresponding disk of the specified volume is cleared.
- the information on the specified volume corresponding to the deleted files on the disk may contain user privacy or user usage traces. Therefore, in order to improve security, the information needs to be cleaned up.
- the information about the deleted files in the disk corresponding to the specified volume is cleared, and the specific implementation manners are different for different file systems.
- the information occupied by deleted files is stored in the main file table (MFT), which is the index of each file on the volume.
- MFT main file table
- the MFT stores a set of files called "attributes" for each file. Record, each attribute stores different types of information, including: file name, file time, file content, etc., wherein the file time includes creation time, modification time, and last access time, and the attribute information may include user privacy. Or use traces.
- the deleted file in the corresponding disk of the specified volume is cleared.
- the specific information of the occupied information is: traversing the MFT of the specified volume, and clearing the information occupied by the deleted file in the MFT.
- the file After the file is deleted, it will be deleted in a byte in the MFT corresponding to the file to indicate that the file has been deleted. Therefore, the MET information occupied by the deleted file can be found according to the deletion mark in the MET. , including file name, file time, file content, etc.
- each file corresponds to a directory entry, and its directory entry includes attribute information such as file name, file time, and file size.
- the information occupied by the deleted file is stored in the directory entry.
- Windows deletes a FAT file the directory entry of the file and the first byte of the long file name are marked as 0xE5. Therefore, the entry in the directory entry starting with 0xE5 is the information occupied by the deleted file.
- the specific method for clearing the information occupied by the deleted file in the disk corresponding to the specified volume is: traversing the directory entry of the specified volume, and clearing the entry in the directory entry starting with 0xE5 .
- the above specified volume corresponds to the free space of the volume in the disk, whether it is deleting the file or formatting the specified volume, and the deleted file is not actually erased, but in the MFT or FAT directory of the file in the partition table. Adding a tag to the entry indicates that it has been deleted. The corresponding file data on the disk still exists, but the occupied space is marked as free space. When a new file is written later, the system will have The data in the free space is overwritten. Therefore, when deleting a file or formatting, the file data in the free space will not be completely erased, resulting in the possibility of user privacy leakage.
- the first type of free space clearing mode Query the bitmap of the specified volume in the file system, and erase the disk space marked as free in the bitmap.
- the bit chart is used to identify the remaining space of the volume, and the space indicated as free in the bit chart is the volume free space.
- the second type of free space clearing mode continuously created on the disk corresponding to the specified volume Temporary files until the failure, and then the created temporary files are cleared. Creating a temporary file can overwrite the original data on the specified volume, thus avoiding user privacy leakage. It should be noted that due to the size limit of the temporary file, for example, under the FAT32 file system, the maximum file is limited to 4G. If the free space of the volume is larger than the file limit, the temporary file needs to be written multiple times until the write fails. After writing, delete all the temporary files you have written to achieve the effect. Further, in order to further prevent the user from leaking the privacy, when the specified volume is a system disk, the method further includes: cleaning the pagefile.sys.
- pagefile.sys is a virtual memory page file created during the installation process, which saves the user's usage traces and involves user privacy.
- the size of this file is the minimum size of your system's virtual memory settings. If the virtual memory setting is 800MB - 1600MB, then a pagefile.sys file with a size of 800MB will appear under the local setting drive.
- process of cleaning the pagefile.sys can be performed before the volume is unlocked, or after the volume is unlocked, without being affected by the volume lock.
- the method provided by the embodiment of the present invention cleans up the discarded disk information corresponding to the specified volume when the cleaning instruction is received, thereby thoroughly cleaning the user privacy remaining in the file system, avoiding leakage of user privacy, and improving the file system.
- Security. 4 is a flow chart of a method of cleaning a file system according to a more detailed embodiment of the present invention. Referring to FIG. 4, the method includes:
- the cleanup instruction is used to indicate a specified volume to be cleaned; the cleaned up instruction may be triggered by a user click, or may be triggered by a file system every preset time when the application is operated. It can also be triggered automatically after the user formats the specified volume; or the user automatically prompts the user for the cleanup command after formatting the specified volume. And triggered by the user.
- the specified volume is the volume to be cleaned. Those skilled in the art will appreciate that if the volume has been opened separately, at this time, when the volume is opened again, the volume opening failure may occur.
- the volume needs to be locked before performing subsequent deletion to ensure that no other file operations are performed on the volume, thereby avoiding damage to the file system.
- locking or unlocking the volume in which the file is located can be accomplished by using the FSCTL_LOCK_VOLUME/FSCTL_UNLOCK_VOLUME control code.
- step 404 Determine whether the specified volume indicated by the cleanup instruction is formatted and does not add or delete files after formatting. If yes, go to step 406, otherwise skip to step 405.
- the determining mechanism of the step 404 can be various.
- the user's formatting operation can be monitored. After the user formats the specified volume, a prompt for formatting the clearing instruction is automatically popped up, and the user is locked before the user triggers the formatting clearing instruction.
- the operation of the volume that is, the user cannot perform the operation of adding and deleting files to the specified volume.
- the clear command triggered by the user in 401 is the format clear command, then in step 404, the designation of the cleanup instruction indication is determined.
- the volume has been formatted and has not been added or deleted since it was formatted.
- API application programming interface
- step 405 under the NTFS file system, specifically, traversing the specified volume
- the MFT clears the information occupied by the deleted file in the MFT.
- the FAT file system specifically includes: traversing the directory entry of the specified volume, and clearing the entry in the directory entry starting with 0xE5. 406. Clear the free space of the volume in the corresponding disk of the specified volume.
- the first type of free space clearing mode Query the bitmap of the specified volume in the file system, and erase the disk space marked as free in the bitmap.
- the second volume free space clearing mode the temporary file is continuously created on the disk corresponding to the specified volume until the failure, and then the created temporary file is cleared.
- the specified volume can be unlocked for subsequent operations.
- the method provided by the embodiment of the present invention cleans up the information occupied by the deleted file of the specified volume and the free space of the volume when the cleaning instruction is received, thereby thoroughly purifying the user privacy remaining in the file system and avoiding user privacy. Leakage to improve the security of the file system.
- the embodiment of the present invention also discloses a device for cleaning the file system. Referring to FIG. 5, the device includes:
- a locking module 501 configured to open and lock a specified volume according to the received cleaning instruction; the cleaning instruction is used to indicate a specified volume to be cleaned;
- the cleaning module 502 is configured to clean the disk discarding information corresponding to the specified volume
- the unlocking module 503 is configured to unlock the specified volume after the cleaning module 502 finishes cleaning.
- the disk discarding information corresponding to the specified volume mainly includes: information about the deleted file in the volume free space of the specified volume and the volume free space in the corresponding disk of the specified volume.
- the cleaning module 502 specifically includes: a first cleaning module 521, configured to clear information about deleted file usage in a disk corresponding to the specified volume;
- the second cleaning module 522 is configured to clear a volume free space in the corresponding disk of the specified volume.
- the cleaning module 502 further includes: The determining module 523 is configured to determine whether the specified volume indicated by the cleaning instruction is formatted and has not added or deleted the file after formatting, and if yes, only the second cleaning module 522 is called to perform corresponding cleaning, that is, Clearing only the volume free space in the disk corresponding to the specified volume; otherwise, the first cleaning module 521 and the second cleaning module 522 are invoked for cleaning, that is, the information occupied by the deleted file in the corresponding disk of the specified volume is cleared, and Clear the free space of the volume in the disk corresponding to the specified volume.
- FIG. 8 is a schematic diagram of a specific composition of the first cleaning module 521. Referring to FIG. 8, the first cleaning module 521 specifically includes:
- the NTFS cleaning submodule 5211 is configured to: traverse the main file table of the specified volume under the NTFS file system, and clear the information occupied by the deleted file in the main file table;
- the FAT cleaning sub-module 5212 is configured to traverse the directory entry of the specified volume under the FAT file system, and clear the entry in the directory entry starting with 0xE5.
- the second cleaning module 522 has two implementations.
- FIG. 9a is a schematic diagram of a composition of the second cleaning module.
- the second cleaning module 522 may specifically include: a free space determining sub-module 5221, To query the bit chart of the specified volume in the file system, and determine the disk space marked as free in the bit chart;
- the erase sub-module 5222 is configured to erase the disk space indicated as free in the bit chart.
- FIG. 9b is a schematic diagram of another composition of the second cleaning module. Referring to FIG. 9b, the second cleaning module 522 may further include:
- the temporary file creation submodule 5223 is configured to continuously create a temporary file on the volume free space of the specified volume until the failure;
- FIG. 10 is a schematic structural diagram of another apparatus for cleaning a file system according to an embodiment of the present invention.
- the cleaning module further includes a third cleaning module 524, configured to determine whether the specified volume is a system disk, and when the specified volume is determined to be a system disk, clear the specified
- the pagefile.syS of the volume is the same as the method embodiment, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
- the device provided by the embodiment of the present invention cleans up the information occupied by the deleted file of the specified volume and the free space of the volume when the cleaning instruction is received, thereby thoroughly cleaning the user privacy remaining in the file system and avoiding user privacy. Leak, improve the security of the file system.
- a data processing program instruction related hardware such as a processor of a computer
- the data processing program may be stored in a readable storage medium, the storage
- the media includes: ROM, RAM, disk or optical disk and other media that can store program code.
- each functional module in each embodiment of the present invention may be integrated into one processing unit, or each module may exist physically separately, or two or more modules may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the functional modules of the various embodiments may be located at one terminal or network node, or may be distributed to more than two terminals or network nodes.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP20120817785 EP2738688A4 (en) | 2011-07-25 | 2012-06-28 | METHOD AND APPARATUS FOR CLEANING FILE SYSTEM, AND CORRESPONDING STORAGE MEDIUM |
US14/235,402 US9104685B2 (en) | 2011-07-25 | 2012-06-28 | Method, device and storage medium for cleaning up file systems |
JP2014521917A JP5833754B2 (ja) | 2011-07-25 | 2012-06-28 | ファイルシステムをクリーニングするための方法及び装置並びにその記憶媒体 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110208944.4 | 2011-07-25 | ||
CN201110208944.4A CN102902672B (zh) | 2011-07-25 | 2011-07-25 | 清理文件系统的方法和装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013013553A1 true WO2013013553A1 (zh) | 2013-01-31 |
Family
ID=47574912
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2012/077694 WO2013013553A1 (zh) | 2011-07-25 | 2012-06-28 | 清理文件系统的方法和装置及存储介质 |
Country Status (5)
Country | Link |
---|---|
US (1) | US9104685B2 (zh) |
EP (1) | EP2738688A4 (zh) |
JP (1) | JP5833754B2 (zh) |
CN (1) | CN102902672B (zh) |
WO (1) | WO2013013553A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102016218934A1 (de) | 2016-09-29 | 2018-03-29 | Continental Teves Ag & Co. Ohg | Verfahren zum Datenaustausch und Datenfusionierung von Umfelddaten |
US20180251781A1 (en) * | 2015-10-06 | 2018-09-06 | Invectys | Polyepitope constructs for use in immunotherapy |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9383924B1 (en) * | 2013-02-27 | 2016-07-05 | Netapp, Inc. | Storage space reclamation on volumes with thin provisioning capability |
CN103677977B (zh) | 2013-12-19 | 2017-05-17 | 贝壳网际(北京)安全技术有限公司 | 清理移动终端中临时文件的方法、装置和移动终端 |
CN104091127B (zh) * | 2014-06-20 | 2017-06-09 | 北京奇虎科技有限公司 | 一种清理隐私记录的方法和装置 |
CN104090922B (zh) * | 2014-06-20 | 2017-12-12 | 北京奇虎科技有限公司 | 一种清理隐私数据的方法和装置 |
KR101605156B1 (ko) | 2014-12-11 | 2016-03-21 | 네이버비즈니스플랫폼 주식회사 | 파일 안전 삭제 기능 제공 장치, 방법 및 컴퓨터 프로그램 |
CN105224877B (zh) * | 2015-09-30 | 2018-01-26 | 四川效率源信息安全技术股份有限公司 | 一种涉密数据清除方法 |
CN106055990B (zh) * | 2016-05-30 | 2018-11-27 | 厦门市美亚柏科信息股份有限公司 | 一种ntfs文件系统的数据彻底粉碎方法和装置 |
US11132128B2 (en) * | 2017-03-24 | 2021-09-28 | Veritas Technologies Llc | Systems and methods for data placement in container-based storage systems |
CN112711567B (zh) * | 2021-01-06 | 2023-04-25 | 湖南同有飞骥科技有限公司 | Session文件使用空间的清理方法和系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1910561A (zh) * | 2004-01-21 | 2007-02-07 | 东洋测器电脑株式会社 | 数据清除处理程序 |
US20080010326A1 (en) * | 2006-06-15 | 2008-01-10 | Carpenter Troy A | Method and system for securely deleting files from a computer storage device |
CN102096644A (zh) * | 2010-03-02 | 2011-06-15 | 卡巴斯基实验室封闭式股份公司 | 用于永久性删除文件数据的系统和方法 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS63307555A (ja) * | 1987-06-10 | 1988-12-15 | Hitachi Ltd | ファイル管理装置 |
JPH10283320A (ja) * | 1997-02-05 | 1998-10-23 | N T T Data:Kk | セキュリティシステム、機密プログラム管理方法及び記録媒体 |
US6070174A (en) * | 1997-09-30 | 2000-05-30 | Infraworks Corporation | Method and apparatus for real-time secure file deletion |
CN1359071A (zh) * | 2001-11-29 | 2002-07-17 | 上海格尔软件股份有限公司 | 彻底删除硬盘文件的方法 |
US7136885B2 (en) * | 2002-12-20 | 2006-11-14 | International Business Machines Corporation | Free space management |
JP2007149071A (ja) * | 2004-01-21 | 2007-06-14 | Orient Sokki Computer Kk | データクリーニング処理プログラム |
WO2005071552A1 (ja) | 2004-01-21 | 2005-08-04 | Orient Instrument Computer Co., Ltd. | データクリーニング処理プログラム |
JP2005222483A (ja) * | 2004-02-09 | 2005-08-18 | Mitsubishi Electric Corp | 情報記録装置 |
JP4183660B2 (ja) * | 2004-06-25 | 2008-11-19 | シャープ株式会社 | ファイル管理方法及び装置 |
US7398348B2 (en) | 2004-08-24 | 2008-07-08 | Sandisk 3D Llc | Method and apparatus for using a one-time or few-time programmable memory with a host device designed for erasable/rewritable memory |
JP4379369B2 (ja) * | 2005-04-04 | 2009-12-09 | 日本電気株式会社 | ファイル管理システム、監視サーバ、監視方法、及び、プログラム |
US20060277183A1 (en) * | 2005-06-06 | 2006-12-07 | Tony Nichols | System and method for neutralizing locked pestware files |
US7426606B2 (en) * | 2006-03-31 | 2008-09-16 | Intel Corporation | Method, apparatus and system for reverting FAT cluster number to file ID and offset of non-FAT flash file system |
JP2008146514A (ja) * | 2006-12-13 | 2008-06-26 | Canon Inc | 情報処理装置、情報処理装置の制御方法、および情報処理装置の制御プログラム |
JP5303935B2 (ja) * | 2008-01-08 | 2013-10-02 | 日本電気株式会社 | データ多重化システムおよびデータ多重化方法 |
CN101650720A (zh) * | 2008-08-14 | 2010-02-17 | 鸿富锦精密工业(深圳)有限公司 | 存档垃圾信息清理系统及方法 |
WO2010109774A1 (ja) * | 2009-03-24 | 2010-09-30 | 日本電気株式会社 | データ処理装置、そのコンピュータプログラムおよびデータ処理方法 |
CN101706817B (zh) * | 2009-12-01 | 2012-07-04 | 中兴通讯股份有限公司 | 分布式文件系统及其垃圾数据清理方法 |
KR20110119408A (ko) * | 2010-04-27 | 2011-11-02 | 삼성전자주식회사 | 데이터 저장 장치 및 그것의 동작 방법 |
-
2011
- 2011-07-25 CN CN201110208944.4A patent/CN102902672B/zh active Active
-
2012
- 2012-06-28 US US14/235,402 patent/US9104685B2/en active Active
- 2012-06-28 EP EP20120817785 patent/EP2738688A4/en not_active Withdrawn
- 2012-06-28 WO PCT/CN2012/077694 patent/WO2013013553A1/zh active Application Filing
- 2012-06-28 JP JP2014521917A patent/JP5833754B2/ja active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1910561A (zh) * | 2004-01-21 | 2007-02-07 | 东洋测器电脑株式会社 | 数据清除处理程序 |
US20080010326A1 (en) * | 2006-06-15 | 2008-01-10 | Carpenter Troy A | Method and system for securely deleting files from a computer storage device |
CN102096644A (zh) * | 2010-03-02 | 2011-06-15 | 卡巴斯基实验室封闭式股份公司 | 用于永久性删除文件数据的系统和方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2738688A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180251781A1 (en) * | 2015-10-06 | 2018-09-06 | Invectys | Polyepitope constructs for use in immunotherapy |
DE102016218934A1 (de) | 2016-09-29 | 2018-03-29 | Continental Teves Ag & Co. Ohg | Verfahren zum Datenaustausch und Datenfusionierung von Umfelddaten |
Also Published As
Publication number | Publication date |
---|---|
CN102902672B (zh) | 2014-04-16 |
US20140149472A1 (en) | 2014-05-29 |
US9104685B2 (en) | 2015-08-11 |
CN102902672A (zh) | 2013-01-30 |
JP5833754B2 (ja) | 2015-12-16 |
JP2014523596A (ja) | 2014-09-11 |
EP2738688A4 (en) | 2014-12-31 |
EP2738688A1 (en) | 2014-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013013553A1 (zh) | 清理文件系统的方法和装置及存储介质 | |
US8549051B2 (en) | Unlimited file system snapshots and clones | |
US7673096B2 (en) | Control apparatus for controlling virtual storage | |
US8200631B2 (en) | Snapshot reset method and apparatus | |
US9037541B2 (en) | Metadata for data storage array | |
US7831560B1 (en) | Snapshot-aware secure delete | |
JP4310338B2 (ja) | 一回書き込み複数回読み出し式ストレージ・システム及びその実施方法 | |
JP4199993B2 (ja) | スナップショット取得方法 | |
JP4799936B2 (ja) | 条件別スナップショット取得方法及びシステム | |
US7818608B2 (en) | System and method for using a file system to automatically backup a file as a generational file | |
US8135677B2 (en) | File management system and method | |
JP4234086B2 (ja) | ファイル・リクエストを処理するための方法、システム、およびプログラム | |
US8924664B2 (en) | Logical object deletion | |
US7353242B2 (en) | File server for long term data archive | |
US11782632B2 (en) | Selective erasure of data in a SSD | |
US8234317B1 (en) | Auto-committing files to immutable status based on a change log of file system activity | |
JP4837378B2 (ja) | データの改竄を防止する記憶装置 | |
US20060277226A1 (en) | System and method for controlling storage of electronic files | |
JP2014520343A (ja) | ファイル/オブジェクトデュアリティをサポートする統合ストレージシステムを提供するためのシステム及び方法 | |
WO2018121454A1 (zh) | 文件访问控制列表管理方法和相关装置和系统 | |
JP5159777B2 (ja) | 情報及びメタデータを管理し記憶する装置及び方法 | |
US8880820B2 (en) | Techniques for using sparse files during snapshots | |
JP2000020367A (ja) | 情報記憶方法および情報記憶装置および記録媒体 | |
US20100131469A1 (en) | Storage management device and file deletion control method | |
WO2011120335A1 (zh) | 数据操作的方法、装置及计算机 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12817785 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2014521917 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14235402 Country of ref document: US |
|
REEP | Request for entry into the european phase |
Ref document number: 2012817785 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012817785 Country of ref document: EP |